LeakedIn Logo
Stories About Data Leaks and Related Stuff

phpMyAdmin SQL Dump

19 votedvote

Detected 1 occurrence(s) of ‘^– phpMyAdmin SQL Dump’:

-- phpMyAdmin SQL Dump
-- version 4.6.4
-- https://www.phpmyadmin.net/
--
-- ХоÑÑ‚: localhost:8889
-- Ð’Ñ€ÐµÐ¼Ñ ÑозданиÑ: ÐÐ¾Ñ 11 2016 г., 10:08
-- ВерÑÐ¸Ñ Ñервера: 5.6.28
-- ВерÑÐ¸Ñ PHP: 7.0.10

SET SQL_MODE = "NO_AUTO_VALUE_ON_ZERO";
SET time_zone = "+00:00";

--
-- База

Source: http://pastebin.com/raw.php?i=CZRc09n1

MySQL Table with Interesting Data

10 votedvote

Detected 3 occurrence(s) of ‘\| (user|username|login|password|email|uid) \|’:

05 11:34:5 |

checks table:
S.No | username | orderid             | exam_name | checked_date         
1    | Rakesh   |746G797W819d3343493z | PMP       | 2016-11-07 11:20:5   
2    | Kulkarni |24890W819d6743493W   | CAPM      | 2016-11-07 11:20:5
	
S.No | username | orderid             | exam_name | order_date         |
1    | Suresh   |52890W819d6743493W   | PMP       | 2016-11-05 11:34:5 |
2    | Gautham  |90890W819d6743493W   | PMP       | 2016-11-05 11:34:5 |

Source: http://pastebin.com/raw.php?i=WChch2V9

MySQL Table with Email/Password Dump

4 votedvote

Detected 1 occurrence(s) of ‘(\| [a-z0-9\-\._]+@\S+\.[a-z]{2,4} \| \S+)’:

               | full_name        |
+----------+---------------------------+------------------------------------------+------------------+
| 6        | wds                       | 171653bcee403872ce0dbb3eac2fa9f2161838d0 | Tony Michaelsson |
| 7        | janne@maskinconsulting.se | 282dbeef3c591722f648b8a217dac4e90f38b4a5 | Jan-Olov Kihl    |
+----------+---------------------------+------------------------------------------+------------------+

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: ID (GET)
    Type: boolean-based blind

Detected 4 occurrence(s) of ‘\|\s+Pass(word)*\s+\|’:

NULL-- oAzd
---
web application technology: Apache, PHP 5.3.29
back-end DBMS: MySQL >= 5.0.0 (MariaDB fork)
Database: 188756-maskinconsultingsedb1
Table: cms_medlem
[0 entries]
+-----------+----------+----------+-----------+
| medlem_id | username | password | full_name |
+-----------+----------+----------+-----------+
+-----------+----------+----------+-----------+

Detected 3 occurrence(s) of ‘\| (user|username|login|password|email|uid) \|’:

,NULL,NULL,NULL-- oAzd
---
web application technology: Apache, PHP 5.3.29
back-end DBMS: MySQL >= 5.0.0 (MariaDB fork)
Database: 188756-maskinconsultingsedb1
Table: cms_medlem
[0 entries]
+-----------+----------+----------+-----------+
| medlem_id | username | password | full_name |
+-----------+----------+----------+-----------+
+-----------+----------+----------+-----------+

Source: http://pastebin.com/raw.php?i=SkaVyaXb

Leaked Data

0 votedvote

Detected 1 occurrence(s) of ‘leaked (by|from)’:

--leaked by LeakingProScripts
local p = game.Players.LocalPlayer
local char = p.Character
local mouse = p:GetMouse()
local larm = char["Left Arm"]
local rarm = char["Right Arm"]
local lleg = char["Left Leg"]
local rleg = char["Right Leg"]
local hed = char.Hea

Source: http://pastebin.com/raw.php?i=PVAMyhZh

Nmap Scan Report

0 votedvote

Detected 5 occurrence(s) of ‘Nmap scan report for’:

t]
[*] Nmap: Completed Ping Scan at 02:28, 1.88s elapsed (256 total hosts)
[*] Nmap: Nmap scan report for 50.63.197.0 [host down]
[*] Nmap: Nmap scan report for 50.63.197.5 [host down]
[*] Nmap: Nmap scan report for 50.63.197.37 [host down]
[*] Nmap: Nmap scan report for 50.63.197.39 [host down]
[*] Nmap: Initiating SYN Stealth Scan at 02:28
[*] Nmap: Scanning 96 hosts [1000 ports/host]
[*] Nmap: Discovered open port 443/tcp on 50.63.197.8
[*] Nmap: Discovered open port 443/tcp on 50.63.197.4
[*] Nmap: Discovered ope

Source: http://pastebin.com/raw.php?i=kTHsywLK